Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
P
pymilter
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Wiki
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Deploy
Releases
Container registry
Model registry
Monitor
Incidents
Analyze
Value stream analytics
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
GitLab community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
misc
pymilter
Commits
c6ac3dda
Commit
c6ac3dda
authored
19 years ago
by
Stuart Gathman
Browse files
Options
Downloads
Patches
Plain Diff
Release 0.8.4
parent
b3dce269
No related branches found
No related tags found
No related merge requests found
Changes
5
Show whitespace changes
Inline
Side-by-side
Showing
5 changed files
CREDITS
+4
-1
4 additions, 1 deletion
CREDITS
Milter/__init__.py
+1
-1
1 addition, 1 deletion
Milter/__init__.py
TODO
+6
-3
6 additions, 3 deletions
TODO
milter.spec
+6
-4
6 additions, 4 deletions
milter.spec
neutral.txt
+1
-1
1 addition, 1 deletion
neutral.txt
with
18 additions
and
10 deletions
CREDITS
+
4
−
1
View file @
c6ac3dda
...
...
@@ -5,8 +5,11 @@ wrapper (Milter.py) that handles attachments, did lots of testing, packaged
it with distutils, and generally transformed it from a quick hack to a
real, usable Python extension.
Other contributors:
Other contributors
(in random order)
:
Dave MacQuigg
for noticing that smfi_insheader wasn't supported, and creating
a template to help first time pymilter users create their own milter.
Terence Way
for providing a Python port of SPF
Scott Kitterman
...
...
This diff is collapsed.
Click to expand it.
Milter/__init__.py
+
1
−
1
View file @
c6ac3dda
...
...
@@ -16,7 +16,7 @@ from milter import ACCEPT,CONTINUE,REJECT,DISCARD,TEMPFAIL, \
try
:
from
milter
import
QUARANTINE
except
:
pass
__version__
=
'
0.8.
3
'
__version__
=
'
0.8.
4
'
_seq_lock
=
thread
.
allocate_lock
()
_seq
=
0
...
...
This diff is collapsed.
Click to expand it.
TODO
+
6
−
3
View file @
c6ac3dda
Train honeypot with auto-whitelisted mail as ham. This should result in
a totally self training auto screener. Rescind whitelist for banned
extensions, in case sender is infected.
Send DSN for permerror before processing extended result. An additional
DSN may be sent based on extended result.
Rescind whitelist for banned extensions, in case sender is infected.
Train honeypot on error only.
Find rfc2822 policy for MFROM quoting.
...
...
This diff is collapsed.
Click to expand it.
milter.spec
+
6
−
4
View file @
c6ac3dda
%define name milter
%define version 0.8.
3
%define version 0.8.
4
%define release 1.RH7
# what version of RH are we building for?
%define redhat9 0
...
...
@@ -169,10 +169,12 @@ rm -rf $RPM_BUILD_ROOT
/usr/share/sendmail-cf/hack/rhsbl.m4
%changelog
*
Fri
Oct 20 2005 Stuart Gathman <stuart@bmsi.com> 0.8.4-1
*
Thu
Oct 20 2005 Stuart Gathman <stuart@bmsi.com> 0.8.4-1
- Fix SPF policy via sendmail access map (case insensitive keys).
- Auto whitelist senders
* Thu Oct 12 2005 Stuart Gathman <stuart@bmsi.com> 0.8.3-1
- Auto whitelist senders, train screener on whitelisted messages
- Optional idx parameter to addheader to invoke smfi_insheader
- Activate progress when SMFIR_PROGRESS defined
* Wed Oct 12 2005 Stuart Gathman <stuart@bmsi.com> 0.8.3-1
- Keep screened honeypot mail, but optionally discard honeypot only mail.
- spf_accept_fail option for braindead SPF senders (treats fail like softfail)
- Consider SMTP AUTH connections internal.
...
...
This diff is collapsed.
Click to expand it.
neutral.txt
+
1
−
1
View file @
c6ac3dda
...
...
@@ -18,7 +18,7 @@ sent via an authorized SMTP server, but may still be legitimate. Since there
is no positive confirmation that the message is really from you, we have
to give it extra scrutiny - including verifying that the sender really
exists by sending you this DSN. We will remember this sender and not
bother you again for while. You can avoid this message entirely for
bother you again for
a
while. You can avoid this message entirely for
legitimate mail by using an authorized SMTP server. Contact your mail
administrator and ask how to configure your email client to use an
authorized server.
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment